Analysis

  • max time kernel
    67s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 13:53

General

  • Target

    df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731.exe

  • Size

    100KB

  • MD5

    c7a310982da68b10360854f9cd78e718

  • SHA1

    60140c28e0b7db797a771c2dee081fa3812246db

  • SHA256

    df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731

  • SHA512

    6747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731.exe
    "C:\Users\Admin\AppData\Local\Temp\df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
        PID:2028
        • C:\Users\Admin\AppData\Roaming\azne.exe
          "C:\Users\Admin\AppData\Roaming\azne.exe"
          3⤵
            PID:272
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              4⤵
                PID:1280
            • C:\Users\Admin\AppData\Roaming\pm.exe
              "C:\Users\Admin\AppData\Roaming\pm.exe"
              3⤵
                PID:560
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAJwAsACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABYAGUAZwBuAHIAZgBiAGwAXABIAGoAYgBqAG0ALgBlAHgAZQAnAA==
                  4⤵
                    PID:436
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                    4⤵
                      PID:816
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & exit
                    3⤵
                      PID:2000
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:780

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/108-57-0x0000000005B90000-0x0000000005BD8000-memory.dmp

                  Filesize

                  288KB

                • memory/108-56-0x00000000087C0000-0x0000000008924000-memory.dmp

                  Filesize

                  1.4MB

                • memory/108-54-0x0000000001230000-0x000000000124E000-memory.dmp

                  Filesize

                  120KB

                • memory/108-55-0x0000000075A61000-0x0000000075A63000-memory.dmp

                  Filesize

                  8KB

                • memory/272-114-0x0000000004A50000-0x0000000004A88000-memory.dmp

                  Filesize

                  224KB

                • memory/272-113-0x0000000006A80000-0x0000000006C1E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/272-101-0x00000000002F0000-0x000000000030E000-memory.dmp

                  Filesize

                  120KB

                • memory/436-134-0x0000000002454000-0x0000000002457000-memory.dmp

                  Filesize

                  12KB

                • memory/436-135-0x000000000245B000-0x000000000247A000-memory.dmp

                  Filesize

                  124KB

                • memory/436-133-0x000007FEEAEC0000-0x000007FEEBA1D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/560-111-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

                  Filesize

                  8KB

                • memory/560-136-0x000000001ACD0000-0x000000001AD6E000-memory.dmp

                  Filesize

                  632KB

                • memory/560-130-0x000000001B386000-0x000000001B3A5000-memory.dmp

                  Filesize

                  124KB

                • memory/560-112-0x000000001BB50000-0x000000001BD1E000-memory.dmp

                  Filesize

                  1.8MB

                • memory/560-110-0x0000000000F00000-0x00000000010E6000-memory.dmp

                  Filesize

                  1.9MB

                • memory/816-140-0x0000000140000000-0x000000014007A000-memory.dmp

                  Filesize

                  488KB

                • memory/816-142-0x0000000140000000-0x000000014007A000-memory.dmp

                  Filesize

                  488KB

                • memory/816-138-0x0000000140000000-0x000000014007A000-memory.dmp

                  Filesize

                  488KB

                • memory/816-147-0x0000000000560000-0x00000000005AE000-memory.dmp

                  Filesize

                  312KB

                • memory/816-137-0x0000000140000000-0x000000014007A000-memory.dmp

                  Filesize

                  488KB

                • memory/816-148-0x00000000021A0000-0x00000000021EC000-memory.dmp

                  Filesize

                  304KB

                • memory/816-149-0x000000001AC86000-0x000000001ACA5000-memory.dmp

                  Filesize

                  124KB

                • memory/816-146-0x000000001B9A0000-0x000000001BA46000-memory.dmp

                  Filesize

                  664KB

                • memory/1280-116-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-115-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-126-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-118-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-119-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-120-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-122-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1280-125-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2028-64-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-58-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-70-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-67-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-66-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-63-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-61-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-59-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB

                • memory/2028-73-0x0000000060900000-0x0000000060992000-memory.dmp

                  Filesize

                  584KB

                • memory/2028-71-0x0000000000400000-0x000000000043D000-memory.dmp

                  Filesize

                  244KB